Publications
1997. Sources of, and exploiting, inconsistency: preliminary report. JOURNAL OF APPLIED NONCLASSICAL LOGICS. 7:13-24.
2000. What does it take to refer? a reply to Bojadziev Journal of Consciousness Studies. 7(5):67-69.
1987. How can a program mean. Proceedings of the 10th Int'l Joint Conference on Artificial Intelligence. :163-166.
2011. Robotson Crusoe–or–What Is Common Sense? Logical Formalizations of Commonsense Reasoning — Papers from the AAAI 2011 Spring Symposium.
1987. Circumscription as introspection. Proceedings of the Second International Symposium on Methodologies for intelligent systems. :440-444.
1989. Some Brief Essays on Mind.
1997. Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development. Software Engineering, International Conference on. :14-14.
2000. Empirical studies of software engineering: a roadmap. Proceedings of the conference on The future of Software engineering. :345-355.
1996. Evaluating workflow and process automation in wide-area software development. Software Process Technology. :188-193.
2007. A computational survey of candidate exonic splicing enhancer motifs in the model plant Arabidopsis thaliana. BMC Bioinformatics. 8(1):159-159.
2008. Advances in multilingual and multimodal information retrieval. Lecture Notes in Computer Science. 5152
2006. Evaluation of Multilingual and Multi-modal Information Retrieval-Seventh Workshop of the Cross-Language Evaluation Forum, CLEF 2006, Alicante, Spain, September 19-21, 2006, Revised Selected Papers. Seventh Workshop of the Cross-Language Evaluation Forum, CLEF 2006.
2007. Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.
2004. Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. :13-13.
2003. The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.